Elliptic Curve Cryptography

April 7, 2014

Speaker: Megan Maguire

Abstract: Public-key cryptography refers to cryptographic algorithms that require both a secret key and a public key that are mathematically linked. The public key is used to encrypt and the private key is used to decrypt. Since the public key is public information, the mathematical relationship between the public and private keys needs to be sufficiently difficult to determine without knowledge of the private key. The elliptic curve discrete logarithm problem (ECDLP) provides such a framework for generating public and private keys. We will learn the basics of elliptic curves over finite fields, the elliptic curve discrete logarithm problem, and how they are used in cryptography.

As always, there will be free food.